Explore jobs
Find specific jobs
Explore careers
Explore professions
Best companies
Explore companies
Security Alliance was founded in 2001 with the mission of providing exceptional security services with integrity and professionalism.
Another coalition of the willing but not a military alliance is the Proliferation Security Initiative (PSI), also initiated in 2002.
2003—ISA creates its first set of best practices guides to combat insider threats, long before insiders were a well-appreciated risk.
2005—ISA chairs the congressionally appointed Cross Sector Cyber Security Working Group Committee, which focuses on the use of market incentives, rather than regulation, the way to improve private sector cybersecurity.
In November of 2008 at the ISSA CISO Forum in Las Vegas, the concept of the Cloud Security Alliance was born.
The issues and opportunities surrounding cloud computing gained considerable notice in 2008 within the information security community.
CSA’s outreach to the information security community to create its initial work product for the 2009 RSA Conference resulted in dozens of volunteers to research, author, edit and review CSA’s first whitepaper.
2009: Incorporated, Issued the first comprehensive best practices for secure cloud computing, “Security Guidance for Critical Areas of Focus for Cloud Computing”
2011: Hosted the White House at our CSA Summit to announce the US Federal Cloud Strategy
2012: Established CSA Europe in Edinburgh, UK2012: Launched the registry of cloud provider security practices, the CSA Security, Trust and Assurance Registry (STAR)
2012—The Senate rejects the Collins-Lieberman cybersecurity bill, which would have modeled cybersecurity on Sarbanes-Oxley.
2013: Established CSA Asia Pacific in Singapore2013: Launched CSA STAR Certification2013: Release Big Data Security & Privacy Research
2013—As directed by Executive Order 13636, the National Institute of Standards and Technology published a draft outline of the Cybersecurity Framework.
2014: Established representation in Peoples Republic of China2014: Release Software Defined Perimeter Specifications2014: Launched CSA STAR Attestation
2014—The NIST Cybersecurity Framework version 1.0 is published, with the ISA at the forefront of shaping its final form.
While it removed the stain of Yalta, the United States was concerned that it would strengthen nationalist factions in Russia that were already suspicious of Western intentions.37undefinedundefined These reservations were to be borne out when Russia invaded Crimea and the Ukraine in 2014.
2015—Congress passes and the president signs the Cybersecurity Act of 2015, which adopts the ISA recommendation of extending liability protection to companies seeking to share cyber threat information.
2016: Forms Australia/New Zealand Regional Coordinating Body2016: Releases ‘The Treacherous Twelve’ Cloud Computing Top Threats in 20162016: Issues Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy
2016 – ISA publishes “The Cybersecurity Social Contract: Implementing a Market-Based Model for Cybersecurity” as a policy guide for the incoming administration and Congress.
2017: STARWatch Cloud Security Management Application becomes generally available2017: Establishes Third-Party Global Consultancy program2017: Releases major updates to Guidance v4.02017: Issues Code of Conduct for GDPR Compliance2017: Releases significant updates to CCSKv4
2017 – ISA and the National Association for Corporate Directors publish an updated version of the “Cyber-Risk Oversight Handbook,” which receives unprecedented endorsement from the Department of Justice and the Department of Homeland Security.
2018 – ISA publishes international cyber-risk handbooks for boards of directors in the United Kingdom and Germany.
2019 – ISA publishes cyber-risk handbooks for boards of directors in Latin America, Japan and Europe.
2020 – ISA and the National Association of Corporate Directors publish an updated version of the cyber risk handbook for boards of directors, The Cyber-Risk Oversight 2020 Handbook.
© 2022, The Heritage Foundation
Rate how well Security Alliance lives up to its initial vision.
Do you work at Security Alliance?
Does Security Alliance communicate its history to new hires?
| Company name | Founded date | Revenue | Employee size | Job openings |
|---|---|---|---|---|
| Atlas Security | 1962 | $4.5M | 40 | 27 |
| Inter-Con Security Systems | 1973 | $443.5M | 35,000 | 675 |
| Andrews International Government Services, Inc | 1984 | $38.0M | 799 | - |
| Anderson Security Agency | 1994 | $19.0M | 350 | - |
| Advantage Security | 1995 | $9.1M | 50 | 6 |
| GSG Protective Services | 2000 | $16.0M | 750 | 15 |
| DK Security | 1994 | $13.0M | 50 | 32 |
| Garrison Protective Services | 1977 | $35.0M | 850 | 8 |
| Madison Security Group | 2004 | $71.0M | 1,500 | - |
| Summit Security Services | 1976 | $110.0M | 2,000 | 182 |
Zippia gives an in-depth look into the details of Security Alliance, including salaries, political affiliations, employee data, and more, in order to inform job seekers about Security Alliance. The employee data is based on information from people who have self-reported their past or current employments at Security Alliance. The data on this page is also based on data sources collected from public and open data sources on the Internet and other locations, as well as proprietary data we licensed from other companies. Sources of data may include, but are not limited to, the BLS, company filings, estimates based on those filings, H1B filings, and other public and private datasets. While we have made attempts to ensure that the information displayed are correct, Zippia is not responsible for any errors or omissions or for the results obtained from the use of this information. None of the information on this page has been provided or approved by Security Alliance. The data presented on this page does not represent the view of Security Alliance and its employees or that of Zippia.
Security Alliance may also be known as or be related to Security Alliance and Security Alliance, LLC.